Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic search tolerance at runtime for lookup determinism in the DHT-based P2P network Kad., , , , and . CCNC, page 355-360. IEEE, (2015)HaRTKad: A hard real-time Kademlia approach., , , and . CCNC, page 309-314. IEEE, (2014)SWIFT: A Secure Web Domain Filter in Hardware., , , , , , and . AINA Workshops, page 678-683. IEEE Computer Society, (2013)Use of Peer-To-Peer technology in Internet access networks and its impacts., and . IPDPS Workshops, page 1-3. IEEE, (2010)Design and development of a management solution for wireless mesh networks based on IEEE 802.11s., , , , and . IM, page 902-905. IEEE, (2015)Application-aware industrial ethernet based on an SDN-supported TDMA approach., , , and . WFCS, page 1-8. IEEE, (2016)DuDE-Cloud: A resilient high performance cloud., , , , and . ETFA, page 1-7. IEEE, (2015)MeNTor: A wireless-mesh-network-aware data dissemination overlay based on BitTorrent., , , , , and . Ad Hoc Networks, (2018)Extensive analysis of a Kad-based distributed storage system for session data., , , and . ISCC, page 489-494. IEEE Computer Society, (2013)Evaluating Cross-Layer Cooperation of Congestion and Flow Control in IEEE 802.11s Networks., , , , , and . AINA, page 181-188. IEEE Computer Society, (2016)